w3af Guide de l'Utilisateur - Exploit Database
w3af Guide de l'Utilisateur - Exploit Database
w3af Guide de l'Utilisateur - Exploit Database
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
......The URL: http://localhost/beef/hook/ has DAV methods enabled:- OPTIONS- GET- HEAD- POST- TRACE- PROPFIND- PROPPATCH- COPY- MOVE- LOCK- UNLOCK- DELETE ( is possibly enabled too, not tested for safety )New URL found by discovery:http://localhost/<strong>w3af</strong>/globalRedirect/wargame/New URL found by discovery:http://localhost/<strong>w3af</strong>/globalRedirect/<strong>w3af</strong>-site.tgzAprès la fin <strong>de</strong> la phase <strong>de</strong> découverte, un résumé est présenté à l'utilisateur:The list of found URLs is:- http://localhost/<strong>w3af</strong>/globalRedirect/<strong>w3af</strong>.testsite.tgz- http://localhost/beef/hook/beefmagic.js.php- http://localhost/<strong>w3af</strong>/globalRedirect/2.php– http://localhost/<strong>w3af</strong>/webSpi<strong>de</strong>r/11.html...Une section du résumé présente les points d'injection qui vont être utilisés durantla phase d'audit:Found 78 URLs and 102 different points of injection.The list of Fuzzable requests is:- http://localhost/<strong>w3af</strong>/ | Method: GET